|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 815 occurrences of 362 keywords
|
|
|
Results
Found 1094 publication records. Showing 1094 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
10 | Wai Chee Yau, Dinesh Kant Kumar, Tharangini Chinnadurai |
Lip-Reading Technique Using Spatio-Temporal Templates and Support Vector Machines. |
CIARP |
2008 |
DBLP DOI BibTeX RDF |
support vector machines, feature selection, motion segmentation, Zernike moments, visual speech recognition |
10 | Tim Dasilva, Kevin Eustice, Peter L. Reiher |
Johnny Appleseed: wardriving to reduce interference in chaotic wireless deployments. |
MSWiM |
2008 |
DBLP DOI BibTeX RDF |
chaotic wireless deployments, wardriving, wireless channel assignment |
10 | Kazuki Yoneyama |
Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract). |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
password-based key exchange, password-based server aided key exchange, leakage of internal states, undetectable on-line dictionary attack |
10 | Jongpil Jeong, Min Young Chung, Hyunseung Choo |
Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Sudhir Aggarwal, Zhenhai Duan, Leo Kermes, Breno de Medeiros |
E-Crime Investigative Technologies. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Yoginder S. Dandass |
Using FPGAs to Parallelize Dictionary Attacks for Password Cracking. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Siddharth Tiwari, Richa Bansal, Divya Bansal |
Optimized client side solution for cross site scripting. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
APOP, Challenge and Response, Password Recovery, Message Difference, Hash Function, Collision Attack, MD5 |
10 | Deholo Nali, Paul C. van Oorschot |
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Mohamed Chenafa, Dan Istrate, Valeriu Vrabie, Michel Herbin |
Biometric System Based on Voice Recognition Using Multiclassifiers. |
BIOID |
2008 |
DBLP DOI BibTeX RDF |
Biometric recognition system, Isolated word recognition, GMM/UBM, Data fusion, Speaker identification |
10 | Wen-Gong Shieh, Wen-Bing Horng |
Efficient and complete remote authentication scheme with smart cards. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Marcos Faúndez-Zanuy |
Protecting Face Biometric DCT Templates by Means of Pseudo-random Permutations. |
COST 2102 Conference (Prague) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt |
Combating digital document forgery using new secure information hiding algorithm. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Muhammad Sharif 0001, Tariq Faiz, Mudassar Raza |
Time signatures - an implementation of Keystroke and click patterns for practical and secure authentication. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
10 | William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick D. McDaniel, Adam D. Smith |
Defending Against Attacks on Main Memory Persistence. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Ragib Hasan, Marianne Winslett, Richard M. Conlan, Brian Slesinsky, Nandakumar Ramani |
Please Permit Me: Stateless Delegated Authorization in Mashups. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Nathan L. Clarke, Steven Furnell |
Authenticating mobile phone users using keystroke analysis. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Keystroke analysis, Authentication, Mobile devices, Biometrics, Keystroke dynamics |
10 | Yossef Oren, Adi Shamir |
Remote Password Extraction from RFID Tags. |
IEEE Trans. Computers |
2007 |
DBLP DOI BibTeX RDF |
sidechannel attacks, RFID, cryptanalysis, power analysis |
10 | Naveen Agarwal, Scott G. Renfro, Arturo Bejar |
Phishing Forbidden. |
ACM Queue |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Xiangqian Wu 0002, David Zhang 0001, Kuanquan Wang |
A Palmprint Cryptosystem. |
ICB |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Rachel R. M. Roberts, Roy A. Maxion, Kevin S. Killourhy, Fahd Arshad |
User Discrimination through Structured Writing on PDAs. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner 0001 |
Dynamic pharming attacks and locked same-origin policies for web browsers. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
same-origin policy, pharming, web authentication |
10 | Benoît Libert, Jean-Jacques Quisquater, Moti Yung |
Forward-secure signatures in untrusted update environments: efficient and generic constructions. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Mohammad Mannan, Paul C. van Oorschot |
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Tyler Moore 0001, Richard Clayton 0001 |
Examining the impact of website take-down on phishing. |
eCrime Researchers Summit |
2007 |
DBLP DOI BibTeX RDF |
electronic crime, phishing, security economics |
10 | Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan |
A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan |
A Secure Authenticated Key Agreement Protocol For Wireless Security. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Weijia Wang, Lei Hu, Yong Li 0002 |
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Password, key distribution, authenticated key exchange, multi-party protocols |
10 | Kazuki Yoneyama, Haruki Ota, Kazuo Ohta |
Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks. |
AAECC |
2007 |
DBLP DOI BibTeX RDF |
different password, C2C-PAKE, cross-realm setting, undetectable on-line dictionary attacks, Authenticated key exchange |
10 | Atul Prakash 0001 |
Security in Practice - Security-Usability Chasm. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Joe Lim |
University of Toronto Mississauga: "the one" project. |
SIGUCCS |
2007 |
DBLP DOI BibTeX RDF |
centralizing systems, enhancing student experience, help desk, id |
10 | Mohamad Badra, Samer El-Sawda, Ibrahim Hajjeh |
Phishing attacks and solutions. |
MobiMedia |
2007 |
DBLP DOI BibTeX RDF |
RSA, phishing, public key infrastructures, TLS, Diffie-Hellman, SRP |
10 | Roman V. Yampolskiy |
Secure Network Authentication with PassText. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Gaëtan Leurent |
Message Freedom in MD4 and MD5 Collisions: Application to APOP. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
message modification, meaningful collisions, APOP security, Hash function, MD5, MD4 |
10 | Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd |
Reducing shoulder-surfing by using gaze-based password entry. |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
gaze-based password entry, password entry, eye tracking, shoulder surfing |
10 | Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith |
TwoKind authentication: usable authenticators for untrustworthy environments. |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Terrance E. Boult, Walter J. Scheirer, Robert Woodworth |
Revocable Fingerprint Biotokens: Accuracy and Security Analysis. |
CVPR |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Terence Sim, Rajkumar Janakiraman |
Are Digraphs Good for Free-Text Keystroke Dynamics? |
CVPR |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Anil K. Jain 0001 |
Biometric Recognition: Overview and Recent Advances. |
CIARP |
2007 |
DBLP DOI BibTeX RDF |
|
10 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Meihua Wang, Kefeng Fan, Qingqi Pei, Shuguang Wang, Shan Cao |
A Novel Digital Content Protection System Based on Iris Biometric. |
FSKD (4) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Wahyudi Martono, Hasimah Ali, Momoh-Jimoh E. Salami |
Keystroke Pressure-Based Typing Biometrics Authentication System Using Support Vector Machines. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
keystroke, maximum pressure, time latency and support vector machine, security, Biometric |
10 | Aslan Askarov, Andrei Sabelfeld |
Gradual Release: Unifying Declassification, Encryption and Key Release Policies. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Saber Zrelli, Yoichi Shinoda |
Specifying Kerberos over EAP: Towards an integrated network access and Kerberos single sign-on process. |
AINA |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Jun Liu, Jianxin Liao, Xiaomin Zhu 0002 |
A Password-Based Authentication and Key Establishment Scheme for Mobile Environment. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Hongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang |
An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise. |
PRDC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won |
Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
authentication, agent, Password, key exchange, inter-domain |
10 | B. Chen, V. Chandran |
Biometric Based Cryptographic Key Generation from Faces. |
DICTA |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Heesun Park, Stan Redford |
Client certificate and IP address based multi-factor authentication for J2EE web applications. |
CASCON |
2007 |
DBLP DOI BibTeX RDF |
IP address checking, J2EE web application, SSL client certificate, certificate based authentication, multi-factor authentication |
10 | Jie Tian 0001, Liang Li, Xin Yang 0001 |
Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment. |
J. Comput. Sci. Technol. |
2006 |
DBLP DOI BibTeX RDF |
techniques and algorithms, biometrics, information security, cryptosystem, fingerprint recognition |
10 | Andrew Teoh Beng Jin, Alwyn Goh, David Ngo Chek Ling |
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2006 |
DBLP DOI BibTeX RDF |
BioHashing, random multispace quantization, face recognition, Cancellable biometrics |
10 | Stéphanie Delaune, Florent Jacquemard |
Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. |
J. Autom. Reason. |
2006 |
DBLP DOI BibTeX RDF |
verification, formal methods, cryptographic protocols, dictionary attacks, probabilistic encryption |
10 | Massimo Merro, Matthew Hennessy |
A bisimulation-based semantic theory of Safe Ambients. |
ACM Trans. Program. Lang. Syst. |
2006 |
DBLP DOI BibTeX RDF |
distributed systems, Mobile agents, bisimulation |
10 | Maria Teresa Carta, Daniele D. Giusto, Cristian Perra, Barbara Podda |
Exploiting JPEG2000 and Jpip for Image Based Authentication. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Haojun Zhang, Yuefei Zhu |
Self-Updating Hash Chains and Their Implementations. |
WISE |
2006 |
DBLP DOI BibTeX RDF |
Server-Supported Signature, authentication, updating, hash chain |
10 | Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters |
Forward-secure signatures with untrusted update. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
untrusted storage, digital signatures, forward security, two-factor authentication |
10 | Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval |
Provably secure password-based authentication in TLS. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
encrypted key exchange, password authentication, TLS |
10 | John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung |
Fourth-factor authentication: somebody you know. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
hardware tokens, vouchers, authentication |
10 | Dasari Shailaja, Phalguni Gupta |
A Simple Geometric Approach for Ear Recognition. |
ICIT |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Weidong Shi, Joshua B. Fryman, Guofei Gu, Hsien-Hsin S. Lee, Youtao Zhang, Jun Yang 0002 |
InfoShield: a security architecture for protecting information usage in memory. |
HPCA |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini |
Quality of Password Management Policy. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Maurizio Adriano Strangio |
An Optimal Round Two-Party Password-Authenticated Key Agreement Protocol. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Sylvia B. Encheva, Sharil Tumin |
Safe Use of Protected Web Resources. |
Intelligent Information Processing |
2006 |
DBLP DOI BibTeX RDF |
E-services |
10 | Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle, Sharat Chikkerur |
Cancelable Biometrics: A Case Study in Fingerprints. |
ICPR (4) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Erhan J. Kartaltepe, Shouhuai Xu |
Towards Blocking Outgoing Malicious Impostor Emails. |
WOWMOM |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Alisher Kholmatov, Berrin A. Yanikoglu |
Biometric Cryptosystem Using Online Signatures. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede |
Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking. |
ARC |
2006 |
DBLP DOI BibTeX RDF |
exhaustive key search, cryptanalysis, hash-functions, FPGA implementation, time-memory trade-off, rainbow table |
10 | Elena Vildjiounaite, Satu-Marja Mäkelä, Mikko Lindholm, Reima Riihimäki, Vesa Kyllönen, Jani Mäntyjärvi, Heikki Ailisto |
Unobtrusive Multimodal Biometrics for Ensuring Privacy and Information Security with Personal Devices. |
Pervasive |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, Dong Hoon Lee 0001 |
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. |
Secure Data Management |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
Password-Based Group Key Exchange in a Constant Number of Rounds. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Group Key Exchange, Password-based Authentication |
10 | Yin Yin, Bao Li 0001 |
Secure Cross-Realm C2C-PAKE Protocol. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho |
Formal analysis of card-based payment systems in mobile devices. |
ACSW |
2006 |
DBLP BibTeX RDF |
card-based systems, formal verification, mobile payment, electronic payments |
10 | Ka-Ping Yee, Kragen Sitaker |
Passpet: convenient password management and phishing protection. |
SOUPS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Leif Nixon |
The Stakkato Intrusions: What Happened and What Have We Learned?. |
CCGRID |
2006 |
DBLP DOI BibTeX RDF |
|
10 | John P. Watt, Oluwafemi O. Ajayi, Jipu Jiang, Jos Koetsier, Richard O. Sinnott |
A Shibboleth-Protected Privilege Management Infrastructure for e-Science Education. |
CCGRID |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park |
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
Performance Evaluation, Smart Card, Fingerprint Verification |
10 | Jongho Ryu |
EAP Using the Split Password-Based Authenticated Key Agreement. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Taekyoung Kwon 0002, Dong Hoon Lee 0002 |
Three-Party Password Authenticated Key Agreement Resistant to Server Compromise. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino |
Privacy preserving multi-factor authentication with biometrics. |
Digital Identity Management |
2006 |
DBLP DOI BibTeX RDF |
identity theft prevention, privacy, authentication, biometrics |
10 | Mauricio Orozco Trujillo, Yednek Asfaw, Shervin Shirmohammadi, Andy Adler, Abdulmotaleb El-Saddik |
Haptic-Based Biometrics: A Feasibility Study. |
HAPTICS |
2006 |
DBLP DOI BibTeX RDF |
Haptic Authentication, Continuous Authentication, Biometrics |
10 | Vasile Gaburici, Peter J. Keleher, Bobby Bhattacharjee |
File System Support for Collaboration in theWide Area. |
ICDCS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Supriya Singh, Anuja Cabraal, Gabriele Hermansson |
What is your husband's name?: sociological dimensions of internet banking authentication. |
OZCHI |
2006 |
DBLP DOI BibTeX RDF |
sociological dimensions, authentication, qualitative research, Australia, Internet banking, security design |
10 | Ann Nosseir, Richard Connor 0001, Karen Renaud |
Question-based group authentication. |
OZCHI |
2006 |
DBLP DOI BibTeX RDF |
security, human factors, computers and society, web-based services, social and behavioral sciences |
10 | Robert Paquet, Abbas Z. Kouzani |
Advances in 3D-Based Face Recognition. |
IJCNN |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan |
A Method for Making Password-Based Key Exchange Resilient to Server Compromise. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Shuhua Wu, Yuefei Zhu |
Practical Password-Based Authenticated Key Exchange Protocol. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 |
Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. |
APWeb |
2006 |
DBLP DOI BibTeX RDF |
Human memorable password, different password authentication, mobile computing, dictionary attacks, authenticated key exchange |
10 | Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian |
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Jun-Cheol Jeon, Kee-Young Yoo |
Authentication Based on Singular Cellular Automata. |
ACRI |
2006 |
DBLP DOI BibTeX RDF |
Singular Operation, Authentication, Cellular Automata, Hash function, One-Time Password |
10 | Errol A. Blake |
The management of access controls/biometrics in organizations. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
IT spending, access control policy (ACP), cyber risk insurance, information technology (IT) information security (InfoSec), system specific policy (SSP), authentication, trust, policy, risk management, systems, return on investment (ROI) |
10 | Jakob E. Bardram |
The trouble with login: on usability and computer security in ubiquitous computing. |
Pers. Ubiquitous Comput. |
2005 |
DBLP DOI BibTeX RDF |
Electronic patient record (EPR), Ubiquitous computing, Computer-supported cooperative work (CSCW), Healthcare, User authentication, Hospitals, Activity-based computing (ABC), Login |
10 | Sara Sinclair, Sean W. Smith |
The TIPPI Point: Toward Trustworthy Interfaces. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
TIPPI, authentication methods, phishing |
10 | Kuo-Feng Hwang, I-En Liao |
Two attacks on a user friendly remote authentication scheme with smart cards. |
ACM SIGOPS Oper. Syst. Rev. |
2005 |
DBLP DOI BibTeX RDF |
cryptanalysis, smart card, remote authentication |
10 | Vance Bjorn |
Biometrics hit the mainstream: an analysis of security and privacy implications. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann 0001 |
A Multipurpose Delegation Proxy for WWW Credentials. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
Credential Delegation, WWW Authentication, Usability, X.509 Certificate, Man-In-The-Middle |
10 | Alex Biryukov, Sourav Mukhopadhyay, Palash Sarkar 0001 |
Improved Time-Memory Trade-Offs with Multiple Data. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
time/memory/data trade-off, key sizes, block-cipher |
10 | Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo |
Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. |
MADNES |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Xia Brustoloni, José Carlos Brustoloni |
Hardening Web browsers against man-in-the-middle and eavesdropping attacks. |
WWW |
2005 |
DBLP DOI BibTeX RDF |
eavesdropping attack, just-in-time instruction, safe staging, well-in-advance instruction, certificate, HTTPS, password, Web browser, SSL, man-in-the-middle attack |
10 | Minh-Huyen Nguyen |
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Mauro Brunato, Danilo Severina |
WilmaGate: a new open access gateway for hotspot management. |
WMASH |
2005 |
DBLP DOI BibTeX RDF |
access gateways, open access networks, wireless networks, authentication, authorization |
Displaying result #901 - #1000 of 1094 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|